mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/03/19 18:14:20
This commit is contained in:
parent
75a9962869
commit
8d44c2879b
37 changed files with 294 additions and 161 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2009-2698 compiled for CentOS 4.8",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-16T16:17:24Z",
|
||||
"updated_at": "2022-02-23T04:22:45Z",
|
||||
"updated_at": "2022-03-19T14:43:34Z",
|
||||
"pushed_at": "2018-02-16T16:30:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 16,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 471700783,
|
||||
"name": "4B5F5F4Bp",
|
||||
"full_name": "belyakovvitagmailt\/4B5F5F4Bp",
|
||||
"owner": {
|
||||
"login": "belyakovvitagmailt",
|
||||
"id": 101933630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101933630?v=4",
|
||||
"html_url": "https:\/\/github.com\/belyakovvitagmailt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/belyakovvitagmailt\/4B5F5F4Bp",
|
||||
"description": "PoC for CVE-2017-0075",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T13:18:12Z",
|
||||
"updated_at": "2022-03-19T13:18:12Z",
|
||||
"pushed_at": "2022-03-19T13:18:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -523,17 +523,17 @@
|
|||
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-29T17:36:11Z",
|
||||
"updated_at": "2022-03-11T12:11:07Z",
|
||||
"updated_at": "2022-03-19T16:45:51Z",
|
||||
"pushed_at": "2020-11-29T17:48:55Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2022-03-18T08:39:43Z",
|
||||
"updated_at": "2022-03-19T12:57:29Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"stargazers_count": 507,
|
||||
"watchers_count": 507,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 506,
|
||||
"watchers": 507,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T12:42:54Z",
|
||||
"updated_at": "2022-03-08T11:40:23Z",
|
||||
"updated_at": "2022-03-19T15:41:44Z",
|
||||
"pushed_at": "2019-05-21T14:52:36Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 53,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -30,8 +30,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 98,
|
||||
"forks": 54,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -323,7 +323,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-28T02:34:31Z",
|
||||
"updated_at": "2022-02-28T16:22:18Z",
|
||||
"pushed_at": "2022-02-28T03:54:44Z",
|
||||
"pushed_at": "2022-03-19T14:07:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -130,12 +130,12 @@
|
|||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 471740268,
|
||||
"name": "gerhart01",
|
||||
"full_name": "skasanagottu57gmailv\/gerhart01",
|
||||
"owner": {
|
||||
"login": "skasanagottu57gmailv",
|
||||
"id": 101940293,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101940293?v=4",
|
||||
"html_url": "https:\/\/github.com\/skasanagottu57gmailv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/skasanagottu57gmailv\/gerhart01",
|
||||
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T15:47:10Z",
|
||||
"updated_at": "2022-03-19T15:47:10Z",
|
||||
"pushed_at": "2022-03-19T15:47:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-03-17T10:38:09Z",
|
||||
"updated_at": "2022-03-19T13:38:14Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 922,
|
||||
"watchers_count": 922,
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"forks_count": 293,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 293,
|
||||
"watchers": 922,
|
||||
"watchers": 923,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -144,12 +144,12 @@
|
|||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 69,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"forks": 70,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2022-03-11T11:54:11Z",
|
||||
"updated_at": "2022-03-19T13:51:35Z",
|
||||
"pushed_at": "2022-01-16T04:17:08Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 47,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 192,
|
||||
"forks": 48,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,7 +25,7 @@
|
|||
"exiftool"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:15:00Z",
|
||||
"updated_at": "2022-03-11T04:47:52Z",
|
||||
"updated_at": "2022-03-19T15:09:08Z",
|
||||
"pushed_at": "2021-11-04T02:17:54Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-01T04:04:42Z",
|
||||
"updated_at": "2022-03-11T04:47:34Z",
|
||||
"updated_at": "2022-03-19T15:09:12Z",
|
||||
"pushed_at": "2021-11-04T02:21:28Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-03-17T10:38:09Z",
|
||||
"updated_at": "2022-03-19T13:38:14Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 922,
|
||||
"watchers_count": 922,
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"forks_count": 293,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 293,
|
||||
"watchers": 922,
|
||||
"watchers": 923,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -202,17 +202,17 @@
|
|||
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-13T06:29:51Z",
|
||||
"updated_at": "2022-03-11T04:47:30Z",
|
||||
"updated_at": "2022-03-19T15:09:22Z",
|
||||
"pushed_at": "2022-01-14T04:21:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1000,12 +1000,12 @@
|
|||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2022-03-18T09:24:40Z",
|
||||
"updated_at": "2022-03-19T17:24:44Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"forks_count": 38,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 225,
|
||||
"forks": 39,
|
||||
"watchers": 226,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -179,12 +179,12 @@
|
|||
"pushed_at": "2022-03-18T16:11:21Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -969,17 +969,17 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2022-03-17T04:13:40Z",
|
||||
"updated_at": "2022-03-19T15:13:07Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"forks_count": 124,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"watchers": 458,
|
||||
"watchers": 459,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1401,17 +1401,17 @@
|
|||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-18T00:05:48Z",
|
||||
"updated_at": "2022-03-18T00:19:02Z",
|
||||
"updated_at": "2022-03-19T12:58:55Z",
|
||||
"pushed_at": "2022-03-18T00:17:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2022-03-14T08:08:53Z",
|
||||
"updated_at": "2022-03-19T17:56:08Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 227,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -184,17 +184,17 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-03-18T21:39:10Z",
|
||||
"updated_at": "2022-03-19T17:12:14Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-03-18T18:39:35Z",
|
||||
"updated_at": "2022-03-19T16:46:59Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1416,
|
||||
"watchers_count": 1416,
|
||||
"stargazers_count": 1417,
|
||||
"watchers_count": 1417,
|
||||
"forks_count": 414,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 414,
|
||||
"watchers": 1416,
|
||||
"watchers": 1417,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -120,6 +120,33 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414878778,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "corelight\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-41773",
|
||||
"description": "A Zeek package which raises notices for Path Traversal\/RCE in Apache HTTP Server 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T06:54:27Z",
|
||||
"updated_at": "2021-10-28T05:48:41Z",
|
||||
"pushed_at": "2021-10-28T05:55:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 420407065,
|
||||
"name": "cve-2021-41773",
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-03-18T18:00:49Z",
|
||||
"updated_at": "2022-03-19T16:21:06Z",
|
||||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"stargazers_count": 1276,
|
||||
"watchers_count": 1276,
|
||||
"forks_count": 347,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 347,
|
||||
"watchers": 1274,
|
||||
"watchers": 1276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1235,10 +1235,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-03-19T04:54:18Z",
|
||||
"updated_at": "2022-03-19T12:42:48Z",
|
||||
"pushed_at": "2022-02-18T08:54:03Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1250,7 +1250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 259,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3148,10 +3148,10 @@
|
|||
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T21:45:33Z",
|
||||
"updated_at": "2022-03-08T10:44:06Z",
|
||||
"updated_at": "2022-03-19T16:17:33Z",
|
||||
"pushed_at": "2022-01-18T08:18:21Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3164,7 +3164,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5214,10 +5214,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-03-19T06:26:17Z",
|
||||
"updated_at": "2022-03-19T17:46:22Z",
|
||||
"pushed_at": "2021-12-27T15:12:20Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5230,7 +5230,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 269,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8395,17 +8395,17 @@
|
|||
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T14:48:30Z",
|
||||
"updated_at": "2022-03-10T09:20:49Z",
|
||||
"updated_at": "2022-03-19T13:53:18Z",
|
||||
"pushed_at": "2021-12-22T15:56:21Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 15,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 70,
|
||||
"forks": 16,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2022-03-19T12:04:49Z",
|
||||
"updated_at": "2022-03-19T18:03:11Z",
|
||||
"pushed_at": "2022-03-19T12:01:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -38,8 +38,8 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T01:25:26Z",
|
||||
"updated_at": "2022-03-19T10:55:31Z",
|
||||
"updated_at": "2022-03-19T16:50:15Z",
|
||||
"pushed_at": "2022-03-09T00:09:46Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T19:06:33Z",
|
||||
"updated_at": "2022-03-19T04:37:30Z",
|
||||
"updated_at": "2022-03-19T17:53:52Z",
|
||||
"pushed_at": "2022-03-15T21:12:46Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 19,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 65,
|
||||
"forks": 20,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-03-18T19:03:15Z",
|
||||
"updated_at": "2022-03-19T16:02:48Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 863,
|
||||
"watchers_count": 863,
|
||||
"stargazers_count": 865,
|
||||
"watchers_count": 865,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 863,
|
||||
"watchers": 865,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -337,17 +337,17 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2022-03-17T16:08:55Z",
|
||||
"updated_at": "2022-03-19T15:56:11Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -530,12 +530,12 @@
|
|||
"pushed_at": "2022-03-18T09:32:30Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -87,17 +87,17 @@
|
|||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2022-03-18T08:24:49Z",
|
||||
"updated_at": "2022-03-19T15:03:35Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 352,
|
||||
"watchers": 353,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-18T08:21:59Z",
|
||||
"updated_at": "2022-03-19T17:24:02Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 240,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-03-19T03:54:49Z",
|
||||
"updated_at": "2022-03-19T13:28:53Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"forks_count": 97,
|
||||
"stargazers_count": 505,
|
||||
"watchers_count": 505,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 97,
|
||||
"watchers": 502,
|
||||
"forks": 98,
|
||||
"watchers": 505,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-15T09:22:19Z",
|
||||
"updated_at": "2022-03-14T01:13:46Z",
|
||||
"updated_at": "2022-03-19T15:09:57Z",
|
||||
"pushed_at": "2022-02-21T08:58:22Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22600 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T05:03:29Z",
|
||||
"updated_at": "2022-03-19T09:43:28Z",
|
||||
"updated_at": "2022-03-19T14:10:04Z",
|
||||
"pushed_at": "2022-03-19T04:17:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
41
2022/CVE-2022-23731.json
Normal file
41
2022/CVE-2022-23731.json
Normal file
|
@ -0,0 +1,41 @@
|
|||
[
|
||||
{
|
||||
"id": 441808910,
|
||||
"name": "WAMpage",
|
||||
"full_name": "DavidBuchanan314\/WAMpage",
|
||||
"owner": {
|
||||
"login": "DavidBuchanan314",
|
||||
"id": 13520633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314\/WAMpage",
|
||||
"description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-26T04:29:09Z",
|
||||
"updated_at": "2022-03-19T16:24:15Z",
|
||||
"pushed_at": "2022-03-19T16:24:28Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"arm",
|
||||
"cve-2022-23731",
|
||||
"exploit",
|
||||
"javascript",
|
||||
"lg-webos",
|
||||
"lg-webos-tv",
|
||||
"lpe",
|
||||
"python",
|
||||
"v8",
|
||||
"webos",
|
||||
"webos-tv"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-03-19T12:04:13Z",
|
||||
"updated_at": "2022-03-19T17:01:07Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 303,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T14:42:21Z",
|
||||
"updated_at": "2022-03-18T16:34:46Z",
|
||||
"updated_at": "2022-03-19T17:23:12Z",
|
||||
"pushed_at": "2022-03-16T19:51:30Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -458,6 +458,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
|
|||
|
||||
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
|
||||
|
||||
### CVE-2022-23731 (2022-03-11)
|
||||
|
||||
<code>
|
||||
V8 javascript engine (heap vulnerability) can cause privilege escalation ,which can impact on some webOS TV models.
|
||||
</code>
|
||||
|
||||
- [DavidBuchanan314/WAMpage](https://github.com/DavidBuchanan314/WAMpage)
|
||||
|
||||
### CVE-2022-23779 (2022-03-02)
|
||||
|
||||
<code>
|
||||
|
@ -3496,6 +3504,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
|
||||
- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
|
||||
- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
|
||||
- [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773)
|
||||
- [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773)
|
||||
|
@ -5212,6 +5221,7 @@ A denial of service vulnerability exists when Microsoft Hyper-V on a host server
|
|||
</code>
|
||||
|
||||
- [gerhart01/hyperv_local_dos_poc](https://github.com/gerhart01/hyperv_local_dos_poc)
|
||||
- [skasanagottu57gmailv/gerhart01](https://github.com/skasanagottu57gmailv/gerhart01)
|
||||
|
||||
### CVE-2020-0905 (2020-03-12)
|
||||
|
||||
|
@ -16851,6 +16861,7 @@ Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows
|
|||
</code>
|
||||
|
||||
- [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV)
|
||||
- [belyakovvitagmailt/4B5F5F4Bp](https://github.com/belyakovvitagmailt/4B5F5F4Bp)
|
||||
|
||||
### CVE-2017-0100 (2017-03-16)
|
||||
|
||||
|
|
Loading…
Reference in a new issue